Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Advances in Computational Intelligence: Theory And Applications
Advances in Computational Intelligence: Theory And Applications
Computational Intelligence (CI) is a recently emerging area in fundamental and applied research, exploiting a number of advanced information processing technologies that mainly embody neural networks, fuzzy logic and evolutionary computation. With a major concern to exploiting the tolerance for imperfection, uncertainty, and partial truth to...
Professional Linux Kernel Architecture (Wrox Programmer to Programmer)
Professional Linux Kernel Architecture (Wrox Programmer to Programmer)
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and...
Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies (Intelligent Robotics and Autonomous Agents)
Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies (Intelligent Robotics and Autonomous Agents)
New approaches to artificial intelligence spring from the idea that intelligence emerges as much from cells, bodies, and societies as it does from evolution, development, and learning. Traditionally, artificial intelligence has been concerned with reproducing the abilities of human brains; newer approaches take inspiration from a wider range of...
The Network Society: Social Aspects of New Media
The Network Society: Social Aspects of New Media
The last three decades have witnessed a dramatic acceleration in the use, demand, and need for telecommunications, data communication, and mass communication transmitted and integrated into networks. Through a synthesis of contemporary theories about modernization, this book offers a broad-ranging introduction to the 'network' society in all its...
AdvancED Flex 3
AdvancED Flex 3
Whether you're a Flex 3 beginner or intermediate user, this book provides the necessary information to help you develop into an expert. Using a practical hands-on approach, it illustrates exactly how to create robust and scalable enterprise-grade Rich Internet Applications (RIAs).

The book is divided into three parts. The first part discusses...

Network Quality of Service Know It All (Morgan Kaufmann Know It All)
Network Quality of Service Know It All (Morgan Kaufmann Know It All)
This book brings all of the elements of network quality of service (QoS) together in a single volume by the best and brightest experts in the field!

The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different
...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Teach Yourself VISUALLY Dreamweaver CS3
Teach Yourself VISUALLY Dreamweaver CS3
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 150 Dreamweaver CS3 tasks. Each task-based spread includes easy, visual directions...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
Result Page: 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy